Advance Computing Security Clusters

A matriculated student in the B.S. in Computing Security needs to take 6 elective courses. It is required to take 4 courses from one cluster and 2 courses from 2 different clusters.

Students can create customized clusters for their special interests provided compositions of clusters are vested by one faculty, one student academic advisor, and approved by the department chair. Courses in a customized cluster should be on the list of approved advanced elective courses of Computing Security. To be counted as a cluster course, a GCCIS course not on the list of advanced elective courses of Computing Security needs to be approved by the chair on a case by case basis, or simply such a course can be counted as a free elective for students. A course prepended with an asterisk is a required course for the cluster.

System Security:

CSCI 455 Principles of Computer Security

*CSEC 461 Computer System Security

CSEC 465 Network & System Security Audit

CSEC 468 Risk Management for Information Security

CSEC 471 Penetration Testing Frameworks & Methodologies

CSEC 473 Cyber Defense Techniques

CSEC 477 Disaster Recovery Planning and Business Continuity

CSEC 479 Advanced Mobile Device Security

Network Security:

*CSEC 462 Network Security and Forensics

CSEC 465 Network & System Security Audit

CSEC 468 Risk Management for Information Security

CSEC 469 Wireless Security

CSEC 471 Penetration Testing Frameworks & Methodologies

CSEC 473 Cyber Defense Techniques

CSEC 477 Disaster Recovery Planning and Business Continuity

Forensics:

*CSEC 462 Network Security and Forensics

CSEC 465 Network & System Security Audit

CSEC 467 Mobile Device Security and Forensics

**CSEC 474 Unix-based System Forensics

**CSEC 475 Windows System Forensics

CSEC 478 Advanced Mobile Device Forensics

** You must chose either CSEC 474 or 475, you can take both, but you must take at least one.